Data Processing Essays and Term Papers

Brief History Of Library Automation: 1930-1996

An automated library is one where a computer system is used to manage one or several of the library's key functions such as acquisitions, serials control, cataloging, circulation and the public access catalog. When exploring the history of library automation, it is possible to return to past ...

Save Paper - Free Paper - Words: 1647 - Pages: 6

Labeling Theory In Criminology and Policy Making

An Analysis of the Implications of Labeling Theory for the Discipline of Criminology and for Policy-Making Purposes The labeling process of bygone centuries left a mark on the poor that has never completely disappeared. People still speak of the 'poor but honest,' and what this phrase expresses ...

Save Paper - Premium Paper - Words: 4780 - Pages: 18

Designing A Video On Demand Server

Video-on-demand (VoD) service will allow customers to request that certain movies or television shows be played on their television sets or computers immediately, giving individuals direct access to the materials stored in a video server. The goal of this project is to design a Video-on-Demand ...

Save Paper - Premium Paper - Words: 2265 - Pages: 9

The Travel Industry And The Internet

3.1 Aims and Objectives For over 20 years, business operations have been computerizing in effort to increase their efficiency and profitability. However, in high-service industries, such as the travel industry, major companies have been reluctant to move in the direction of internet ...

Save Paper - Premium Paper - Words: 9352 - Pages: 35

What Is Virtual Reality

I. The term Virtual Reality (VR) is used by many different people with many meanings. There are some people to whom VR is a specific collection of technologies, that is a Head Mounted Display, Glove Input Device and Audio. Some other people stretch the term to include conventional books, movies ...

Save Paper - Premium Paper - Words: 4298 - Pages: 16

A Comparison Of Two Network Operating Systems; Microsoft Win

Running head: Network Operating Systems A Comparison of Two Network Operating Systems; Microsoft Windows NT and Unix Introduction The decision to utilize Microsoft Windows NT Server or one of the many Unix operating systems is the concern of many IS managers around the world ...

Save Paper - Premium Paper - Words: 1800 - Pages: 7

A Comparison Of Two Network Op

Running head: Network Operating Systems A Comparison of Two Network Operating Systems; Microsoft Windows NT and Unix Introduction The decision to utilize Microsoft Windows NT Server or one of the many Unix operating systems is the concern of many IS managers around the world ...

Save Paper - Premium Paper - Words: 1800 - Pages: 7

Networks

DESCRIPTION OF A NETWORK A network is the linking of two or more computers for the purpose of sharing data, programs and/or physical resources. Examples: Data Two people can work independently on the same project at different computers. By being connected to each other, there is no ...

Save Paper - Premium Paper - Words: 3725 - Pages: 14

Brief History Of Databases

In the 1960's, the use of main frame computers became widespread in many companies. To access vast amounts of stored information, these companies started to use computer programs like COBOL and FORTRAN. Data accessibility and data sharing soon became an important feature because of the large ...

Save Paper - Premium Paper - Words: 1723 - Pages: 7

Telecommunication

1. Introduction Computer and telephone networks inflict a gigantic impact on today's society. From letting you call John in Calgary to letting you make a withdraw at your friendly ATM machine they control the flow of information. But today's complicated and expensive networks did not start out ...

Save Paper - Premium Paper - Words: 3597 - Pages: 14

Atm Network

The Asynchronous Transfer Mode has been chosen as the standard system concept for integrated broadband communication networks by the ITU﷓T. The system is predicted to grow rapidly as soon as it becomes widely accepted by network operators and users. Why has communications evolved in history ...

Save Paper - Free Paper - Words: 2013 - Pages: 8

Raspberry Pi Packet Sniffer

CONTENTS ACKNOWLEDGEMENT.....................................i ABSTRACT...........................................ii 1. INTRODUCTION.....................................1 2. PURPOSE..........................................3 2.1 Network Security Basics.........................3 2.2 Risk ...

Save Paper - Premium Paper - Words: 6106 - Pages: 23

Isdn For Small Business

The following will discuss the application and analysis ISDN (Integrated Services Digital Network) to the residential and small business user. ISDN is a digital connection of phone lines from the customer to the telephone exchange. Digital communication is able to transmit all types of ...

Save Paper - Free Paper - Words: 2271 - Pages: 9

Network Security

2.4.1 Passwords 6 2.4.2 Data Encryption and decryption 6 2.4.3 Historical and Statistical Logging 7 2.4.4 Closed User Groups 7 2.2.5 Secure Transmission Facilities 7 2.2.6 Firewalls 7 2.2.7 Physical security 8 APPENDIX B 9 APPENDIX C 9 Security: How do you secure business Information ...

Save Paper - Premium Paper - Words: 2810 - Pages: 11

What Effect Does Aging Have On Memory?

? ‘It seems, then, that we owe to memory almost all that we either have or are; that our ideas and conceptions are its work, and that our everyday perception, thought, and movement is derived from this source. Memory collects the countless phenomena of our existence into a single whole; and, as ...

Save Paper - Premium Paper - Words: 5469 - Pages: 20

The Computer Underground

Department of Sociology Northern Illinois University DeKalb, IL 60115 (5 March, 1990) THE BAUDY WORLD OF THE BYTE BANDIT: A POSTMODERNIST INTERPRETATION OF THE COMPUTER UNDERGROUND An earlier version of this paper was presented at the ...

Save Paper - Premium Paper - Words: 10572 - Pages: 39

Home Shopping

Conventional Shopping in Malaysia Shopping is an activities that cannot be avoid from every Malaysian in nowadays society. Every weekend or public holiday, we will go shopping with family or friends. So, we noticed that shopping is already become a necessary event in our life. Since we do shopping ...

Save Paper - Premium Paper - Words: 3033 - Pages: 12

Programmers

write the code that tells computers what to do. System code tells a computer how to interact with its hardware; applications code tells a computer how to accomplish a specific task, such as word processing or spreadsheet calculating. Systems must be familiar with hardware specifications, design, ...

Save Paper - Free Paper - Words: 1830 - Pages: 7

Hackers

Introduction . . . . . . . . . . . . . . . . . . . 1 Methodology . . . . . . . . . . . . . . . . . . . 6 What is the Computer Underground? . . . . . . . . 11 Topography of the Computer Underground . . . . . . 20 Hacking . . . . . . . . . . . . . . . . . 20 Phreaking . . . . . . . . . . . . . ...

Save Paper - Premium Paper - Words: 10104 - Pages: 37

The Computer Underground

NORTHERN ILLINOIS UNIVERSITY THE SOCIAL ORGANIZATION OF A THESIS SUBMITTED TO THE GRADUATE SCHOOL IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE MASTER OF ARTS DEPARTMENT OF SOCIOLOGY BY ...

Save Paper - Premium Paper - Words: 15764 - Pages: 58


« Prev 1 ... 2 3 4 5 6 7 8 9 10 11 12 ... 16 Next »

Copyright | Cancel | Statistics | Contact Us

Copyright © 2024 Essayworld. All rights reserved